Code Red Scenario: E-commerce Platform Crisis

ShopCore Technologies: E-commerce platform serving 5,000 online retailers, 320 employees
Worm • Code Red
STAKES
Retailer revenue + Customer shopping data + Platform reputation + Holiday shopping season
HOOK
ShopCore Technologies is managing Black Friday weekend traffic for 5,000 online retailers when their IIS web servers hosting e-commerce platforms begin displaying defacement messages instead of shopping websites. The infected servers are now participating in coordinated internet attacks while retailers lose critical holiday revenue during the most important shopping period of the year.
PRESSURE
Black Friday weekend - peak shopping season revenue loss threatens retailer businesses + Platform reputation damage affects company survival
FRONT • 120 minutes • Advanced
ShopCore Technologies: E-commerce platform serving 5,000 online retailers, 320 employees
Worm • Code Red
NPCs
  • Victoria Chen (Platform Operations Director): Managing peak holiday shopping traffic for 5,000 retailers, watching e-commerce platforms get defaced during the most critical revenue period of the year
  • Mark Rodriguez (Security Engineer): Discovering that platform servers are participating in internet-wide attacks while retailer websites display defacement messages instead of products
  • Amanda Johnson (Client Success Manager): Managing crisis communications with thousands of retailers losing holiday revenue due to platform compromise during Black Friday weekend
  • Kevin Wu (Infrastructure Manager): Coordinating emergency response while maintaining platform availability for retailers dependent on holiday shopping revenue
SECRETS
  • E-commerce platform delayed IIS security patches during holiday preparation to avoid disrupting critical shopping season
  • Thousands of retailer websites share vulnerable server infrastructure with minimal security isolation
  • Platform's infected servers are now attacking other e-commerce and financial services infrastructure across the internet

Planning Resources

Tip📋 Comprehensive Facilitation Guide Available

For detailed session preparation support, including game configuration templates, investigation timelines, response options matrix, and round-by-round facilitation guidance, see:

Code Red E-commerce Platform Planning Document

Planning documents provide 30-minute structured preparation for first-time IMs, or quick-reference support for experienced facilitators.

Note🎬 Interactive Scenario Slides

Ready-to-present RevealJS slides with player-safe mode, session tracking, and IM facilitation notes:

Code Red E-commerce Scenario Slides

Press ‘P’ to toggle player-safe mode • Built-in session state tracking • Dark/light theme support


Scenario Details for IMs

ShopCore Technologies: E-Commerce Infrastructure Crisis During Black Friday Weekend

Organization Profile

  • Type: Software-as-a-Service e-commerce platform providing hosted shopping cart systems, payment processing integration, inventory management, and digital storefront solutions for small to medium-sized online retailers across consumer goods, specialty products, and direct-to-consumer brands
  • Size: 320 employees including 140 software engineers developing platform features and maintaining multi-tenant infrastructure, 65 customer support specialists managing retailer technical assistance and merchant onboarding, 45 systems administrators operating shared hosting infrastructure serving 5,000 retailer websites, 35 sales and account management staff, 20 payment compliance and security personnel managing PCI DSS requirements, 10 executive leadership, and 5 cybersecurity infrastructure personnel
  • Annual Operations: Hosting 5,000 online retailer storefronts generating $180 million annual subscription revenue through tiered pricing plans, processing $2.4 billion in combined annual transaction volume across all merchant customers, managing peak traffic loads during Black Friday through Cyber Monday weekend representing 35% of retailer annual revenue concentration, maintaining 99.95% platform uptime service level agreements with financial penalties for service disruptions, coordinating payment gateway integrations with major credit card processors requiring PCI DSS Level 1 compliance validation, supporting real-time inventory synchronization across 15,000 product catalogs, and operating shared IIS web server infrastructure where thousands of retailer websites share physical hardware creating lateral movement risks during security incidents
  • Current Holiday Crisis: Black Friday weekend two days away—largest shopping event of the year with 35% of retailer annual revenue concentrated in four-day period, any platform disruption creates immediate merchant revenue loss and competitive migration to alternative e-commerce platforms threatening ShopCore’s market position

Key Assets & Impact

Asset Category 1: Retailer Revenue Dependency & Holiday Shopping Season - 5,000 merchants depend on platform availability during Black Friday weekend, 35% annual revenue concentration creates maximum business pressure, service disruptions trigger immediate competitive platform migration

Asset Category 2: Platform Reputation & Customer Retention - E-commerce SaaS market highly competitive, security incidents and uptime failures drive merchant churn to Shopify/BigCommerce competitors, reputation damage affects new customer acquisition and enterprise sales pipeline

Asset Category 3: Internet Infrastructure Participation & Regulatory Exposure - Code Red worm converts platform servers into attack infrastructure participating in internet-wide DDoS operations, ShopCore becomes unwitting participant in cybercrime affecting payment processors and financial institutions, potential PCI DSS compliance violations

Immediate Business Pressure

Thursday Morning, 6:45 AM - 48 Hours Before Black Friday:

VP of Engineering Marcus Chen discovered Code Red worm had infected 280 of ShopCore’s 320 shared IIS web servers during Wednesday night. The worm was actively scanning internet addresses, participating in coordinated DDoS attacks against financial services infrastructure, and degrading server performance affecting page load times for 5,000 retailer storefronts.

Black Friday shopping began Friday midnight—less than 48 hours away. Merchant customers were finalizing promotional campaigns, inventory allocations, and advertising campaigns driving traffic to ShopCore-hosted websites. Any platform disruption during peak shopping weekend would create catastrophic merchant revenue loss and permanent competitive damage as retailers migrated to alternative platforms.

But patching infected servers required temporary service disruptions affecting thousands of retailer websites during critical pre-Black Friday preparation window. Payment processors were also threatening to suspend ShopCore’s PCI DSS compliance certification due to compromised infrastructure hosting payment data—potentially blocking all transaction processing during peak revenue period.

Critical Timeline & Operational Deadlines

  • Wednesday night: Code Red infiltration across shared server infrastructure
  • Thursday, 6:45 AM (Session Start): Worm discovery 48 hours before Black Friday
  • Friday, 12:01 AM: Black Friday shopping begins, peak traffic surge expected
  • Friday-Monday: Black Friday through Cyber Monday weekend, 35% annual retailer revenue at stake
  • Ongoing: Worm DDoS participation affecting payment processor infrastructure

Cultural & Organizational Factors

Factor 1: Holiday preparation pressure delayed IIS security patches to avoid merchant service disruptions during critical shopping season setup

Factor 2: Shared multi-tenant architecture created lateral movement opportunities without security segmentation between retailer environments

Factor 3: Platform uptime priority reduced security monitoring visibility during high-traffic preparation periods

Factor 4: Competitive SaaS market pressure emphasized feature development over infrastructure security maintenance

Operational Context

E-commerce platform providers operate in highly competitive SaaS markets where service reliability, feature richness, and holiday performance determine merchant retention—platform disruptions during peak shopping seasons create permanent competitive damage as merchants migrate to alternative solutions demonstrating superior operational resilience, making Black Friday weekend performance existentially important for customer retention and market positioning.

Key Stakeholders

Stakeholder 1: Marcus Chen - VP of Engineering Stakeholder 2: Jennifer Martinez - CEO Stakeholder 3: David Kim - Head of Customer Success Stakeholder 4: Payment Processor Compliance Officer

Why This Matters

You’re not just removing network worms from e-commerce platforms—you’re determining whether SaaS infrastructure providers prioritize short-term merchant service continuity over security remediation when Black Friday revenue concentration creates operational pressure against maintenance disruptions.

You’re not just meeting platform SLA commitments—you’re defining whether e-commerce infrastructure providers accept that compromised servers participate in internet-wide attacks affecting payment ecosystems, or implement disruptive patches protecting broader financial infrastructure despite merchant impact.

IM Facilitation Notes

1. Emphasize dual impact—merchant business survival AND payment infrastructure stability both at risk

2. Make Black Friday timing tangible—35% annual revenue concentration in 4-day weekend creates genuine existential pressure

3. Use shared infrastructure architecture to explore multi-tenant security isolation failures

4. Present Code Red as internet-wide threat where ShopCore’s servers contribute to payment processor DDoS

5. Address platform provider responsibility balancing merchant service against financial ecosystem protection

6. Celebrate coordinated merchant communication and staged remediation despite competitive pressure

Opening Presentation

“It’s Black Friday morning at ShopCore Technologies, and the platform is handling record traffic for 5,000 online retailers during the most critical shopping weekend of the year. Instead of product catalogs and shopping carts, retailer websites are displaying ‘HELLO! Welcome to http://www.worm.com! Hacked By Chinese!’ while the platform’s servers are generating massive internet scanning traffic, effectively turning the e-commerce infrastructure into part of a coordinated attack network.”

Initial Symptoms to Present:

Warning🚨 Initial User Reports
  • “Retailer e-commerce websites displaying defacement messages instead of product catalogs”
  • “Shopping cart and payment systems showing ‘Hacked By Chinese!’ messages during peak sales”
  • “Platform IIS servers generating massive scanning traffic affecting internet bandwidth”
  • “5,000 retailers unable to process holiday sales through compromised platform infrastructure”

Key Discovery Paths:

Detective Investigation Leads:

  • E-commerce platform forensics reveal buffer overflow exploitation targeting holiday shopping infrastructure
  • Shopping transaction system analysis shows memory-only worm infection across platform web servers
  • Holiday shopping timeline analysis indicates compromise during peak Black Friday traffic

Protector System Analysis:

  • E-commerce network monitoring reveals infected servers participating in coordinated attacks against financial infrastructure
  • Platform security assessment shows delayed patch management affecting critical holiday shopping operations
  • Customer shopping data integrity analysis indicates potential exposure through compromised e-commerce systems

Tracker Network Investigation:

  • Internet traffic analysis reveals e-commerce platform participating in attacks against other shopping and financial services
  • Retail network communication patterns show coordination with other infected e-commerce and payment systems
  • Holiday shopping traffic analysis indicates massive revenue impact across thousands of dependent retailers

Communicator Stakeholder Interviews:

  • Retailer communications regarding holiday revenue loss and customer shopping disruption
  • Customer service management dealing with shoppers unable to complete purchases during Black Friday
  • E-commerce industry coordination about platform security and holiday shopping protection

Mid-Scenario Pressure Points:

  • Hour 1: Major retailer reports $2 million in lost Black Friday sales due to defaced e-commerce platform
  • Hour 2: Payment processing companies report attacks originating from ShopCore’s infrastructure
  • Hour 3: 5,000 retailers demanding immediate platform restoration as holiday shopping weekend continues
  • Hour 4: News media reports widespread e-commerce disruption affecting Black Friday shopping nationwide

Evolution Triggers:

  • If response exceeds 12 hours, retailers lose entire Black Friday weekend revenue affecting annual business results
  • If worm containment fails, infection spreads to payment processing and financial services infrastructure
  • If platform restoration is delayed, customer shopping data exposure threatens long-term business relationships

Resolution Pathways:

Technical Success Indicators:

  • Emergency patch deployment stops worm propagation across e-commerce platform infrastructure
  • Retailer websites restored through secure backup systems maintaining holiday shopping capabilities
  • Platform servers removed from coordinated attack network while preserving shopping transaction processing

Business Success Indicators:

  • E-commerce operations restored with minimal impact on retailer holiday revenue and customer shopping
  • Platform reputation protected through rapid response and transparent communication with retail partners
  • Customer shopping data secured preventing long-term damage to e-commerce trust and relationships

Learning Success Indicators:

  • Team understands e-commerce platform’s critical role in holiday retail economy and internet infrastructure
  • Participants recognize platform cybersecurity responsibilities during peak commercial periods
  • Group demonstrates coordination between business continuity and internet security obligations

Common IM Facilitation Challenges:

If Retailer Impact Is Underestimated:

“Your technical response is solid, but Amanda just reported that 5,000 retailers are losing Black Friday revenue and threatening to switch platforms. How do you balance worm investigation with critical business relationships?”

If Internet Attack Participation Is Ignored:

“While you’re restoring shopping platforms, Mark discovered that your servers are attacking payment processing companies and other e-commerce infrastructure. How does this change your response strategy?”

If Holiday Timeline Is Overlooked:

“Victoria needs to know: can the platform be restored in time to capture Cyber Monday traffic, or will retailers lose the entire holiday shopping weekend?”

Success Metrics for Session:


Template Compatibility

Quick Demo (35-40 min)

  • Rounds: 1
  • Actions per Player: 1
  • Investigation: Guided
  • Response: Pre-defined
  • Focus: Use the “Hook” and “Initial Symptoms” to quickly establish e-commerce holiday crisis. Present the “Guided Investigation Clues” at 5-minute intervals. Offer the “Pre-Defined Response Options” for the team to choose from. Quick debrief should focus on recognizing worm propagation patterns and e-commerce infrastructure vulnerabilities.

Lunch & Learn (75-90 min)

  • Rounds: 2
  • Actions per Player: 2
  • Investigation: Guided
  • Response: Pre-defined
  • Focus: This template allows for deeper exploration of e-commerce platform cybersecurity challenges. Use the full set of NPCs to create realistic holiday shopping pressures. The two rounds allow Code Red to spread affecting more retailers, raising stakes. Debrief can explore balance between business operations and internet infrastructure responsibility.

Full Game (120-140 min)

  • Rounds: 3
  • Actions per Player: 2
  • Investigation: Open
  • Response: Creative
  • Focus: Players have freedom to investigate using the “Key Discovery Paths” as IM guidance. They must develop response strategies balancing retailer holiday revenue, platform reputation, customer shopping data, and internet security responsibilities. The three rounds allow for full narrative arc including worm’s e-commerce-specific impact and coordinated attack participation.

Advanced Challenge (150-170 min)

  • Rounds: 3
  • Actions per Player: 2
  • Investigation: Open
  • Response: Creative
  • Complexity: Add red herrings (e.g., legitimate platform updates causing unrelated shopping disruptions). Make containment ambiguous, requiring players to justify retailer-facing decisions with incomplete information. Remove access to reference materials to test knowledge recall of worm behavior and e-commerce platform security principles.

Quick Demo Materials (35-40 min)

Guided Investigation Clues

Clue 1 (Minute 5): “E-commerce platform forensics reveal Code Red worm exploiting IIS buffer overflow vulnerability in web servers hosting 5,000 retailer websites. The memory-only worm is spreading autonomously through ShopCore’s infrastructure, defacing shopping platforms with ‘HELLO! Welcome to http://www.worm.com! Hacked By Chinese!’ messages during peak Black Friday traffic.”

Clue 2 (Minute 10): “Network monitoring reveals infected platform servers generating massive internet scanning traffic and participating in coordinated attacks against payment processing and financial services infrastructure. Holiday shopping timeline analysis indicates the compromise began during Black Friday preparation when IIS patches were delayed to avoid disrupting critical shopping season.”

Clue 3 (Minute 15): “Real-time traffic analysis shows ShopCore’s infected servers attacking other e-commerce and financial infrastructure across the internet. Platform security assessment reveals 5,000 retailers have lost Black Friday shopping capabilities, with major retailers reporting multi-million dollar revenue losses during the most critical shopping weekend of the year.”


Pre-Defined Response Options

Option A: Emergency IIS Patching & Platform Isolation

  • Action: Immediately deploy emergency IIS patches to all platform servers, isolate infected systems from internet to stop coordinated attacks, restore retailer websites from secure backups, establish emergency shopping platform for Black Friday continuity.
  • Pros: Completely stops worm propagation and ends platform participation in internet attacks; enables rapid retailer website restoration for holiday shopping revenue recovery.
  • Cons: Requires complete platform patching affecting all 5,000 retailers temporarily; some shopping data from Black Friday morning may be lost.
  • Type Effectiveness: Super effective against Worm type malmons like Code Red; memory-only worm is eliminated through reboot after patching.

Option B: Selective Server Restoration & Revenue Priority

  • Action: Quarantine confirmed infected servers, implement prioritized restoration for high-revenue retailers first, maintain shopping capabilities for unaffected retailers while accelerating platform-wide remediation.
  • Pros: Allows continued holiday shopping operations for major retailers; protects platform business relationships through revenue-prioritized recovery.
  • Cons: Risks continued worm propagation in non-prioritized infrastructure; platform continues participating in internet attacks during selective restoration.
  • Type Effectiveness: Moderately effective against Worm threats; reduces but doesn’t eliminate worm presence or attack participation.

Option C: Platform Reboot & Mass Restoration

  • Action: Perform coordinated platform-wide reboot to eliminate memory-only worm, rapidly restore all 5,000 retailer websites simultaneously from backups, coordinate with internet security community about attack cessation.
  • Pros: Fastest technical solution eliminating worm through memory clearing; demonstrates internet security responsibility through coordinated response.
  • Cons: Requires complete platform downtime affecting all retailers simultaneously during Black Friday; doesn’t address underlying IIS vulnerability enabling future reinfection.
  • Type Effectiveness: Partially effective against Worm malmon type; eliminates current infection but leaves vulnerability for rapid reinfection.

Lunch & Learn Materials (75-90 min, 2 rounds)

Round 1: Discovery & Identification (30-35 min)

Investigation Clues:

  • Clue 1 (Minute 5): Retailer Support Manager Jennifer Martinez reports 500+ urgent tickets from retailers seeing defacement messages instead of product catalogs on Black Friday morning. “Our retailers are losing millions in holiday sales every minute!”
  • Clue 2 (Minute 10): Platform forensics reveal Code Red worm exploiting IIS buffer overflow in e-commerce infrastructure. The worm is autonomously spreading through 5,000 retailer websites, defacing shopping pages with “HELLO! Welcome to http://www.worm.com! Hacked By Chinese!” during peak shopping traffic.
  • Clue 3 (Minute 15): E-commerce network monitoring shows infected platform servers generating massive scanning traffic and participating in coordinated attacks against other retail and payment processing infrastructure on the busiest shopping day of the year.
  • Clue 4 (Minute 20): Platform SecuPre-Defined Response Optionsrity Director Robert Chen reveals that IIS patches were delayed to avoid disrupting Black Friday preparations. “We couldn’t risk platform updates during our critical revenue period - Black Friday represents 40% of annual retailer income.”

Response Options:

  • Option A: Emergency Platform Reboot - Immediately reboot all infected platform servers to clear memory-only worm, restore retailer websites from backups, delay comprehensive patching until after Black Friday weekend.
    • Pros: Fastest path to retailer website restoration; minimal Black Friday disruption; maintains holiday shopping revenue.
    • Cons: Doesn’t patch underlying IIS vulnerability; servers will be reinfected within hours; continues internet attack participation risk.
    • Type Effectiveness: Partially effective - clears current infection but leaves reinfection vector open.
  • Option B: Selective Patching with Revenue Priority - Patch high-revenue retailer websites first (major brands), quarantine remaining infected sites, restore services in revenue-prioritized order.
    • Pros: Protects highest-revenue retailers; balances security with business needs; enables controlled restoration.
    • Cons: Smaller retailers remain compromised; differential treatment damages platform trust; partial attack participation continues.
    • Type Effectiveness: Moderately effective - stops propagation in patched systems but worm remains active in others.
  • Option C: Platform Isolation & Emergency Shopping Mode - Isolate entire platform from internet to stop attack participation, implement emergency read-only shopping catalog for Black Friday, defer full remediation to next week.
    • Pros: Stops platform’s attack participation immediately; maintains basic shopping capability; allows systematic patching post-holiday.
    • Cons: No transaction processing capability; massive revenue loss for all retailers; emergency mode requires rapid deployment.
    • Type Effectiveness: Moderately effective - contains threat but sacrifices revenue for security.

Round 2: Scope Assessment & Response (30-35 min)

Investigation Clues:

  • Clue 5 (Minute 30): If Option A (reboot only) was chosen: Within 2 hours, platform is reinfected. Payment processors report that eShopHaven servers are attacking their infrastructure. “Visa and Mastercard gateways are being hammered by your platform.”
  • Clue 5 (Minute 30): If Option B or C was chosen: Revenue analysis shows major retailers successfully processed Black Friday transactions, but 3,000 small retailers lost 8 hours of peak holiday shopping - representing $50M in lost revenue affecting small business survival.
  • Clue 6 (Minute 40): Platform forensics reveal worm has been resident for 12 hours, allowing potential access to customer payment data and retailer inventory systems during Black Friday shopping rush.
  • Clue 7 (Minute 50): CEO receives calls from major retailers threatening platform migration if Black Friday revenue losses aren’t compensated. “Target and Best Buy are considering moving to competitor platforms next year.”
  • Clue 8 (Minute 55): Legal counsel advises that customer payment data exposure requires breach notification under PCI-DSS and state laws. Black Friday weekend timeline complicates customer communication about potential credit card compromise.

Response Options:

  • Option A: Emergency Full Patching with Retailer Compensation - Deploy comprehensive IIS patching across entire platform immediately, coordinate simultaneous retailer website restoration, offer revenue-loss compensation to affected retailers, issue proactive payment data exposure notification.
    • Pros: Completely eliminates worm; demonstrates retailer partnership through compensation; meets regulatory requirements; protects long-term platform trust.
    • Cons: Brief downtime affects remaining Black Friday sales; compensation is expensive; acknowledges security failure during critical period.
    • Type Effectiveness: Super effective against Worm type - eliminates vulnerability and infection completely.
  • Option B: Weekend Containment with Post-Holiday Remediation - Maintain current containment state through Black Friday weekend, implement emergency transaction security monitoring, schedule comprehensive patching for Monday after holiday weekend ends.
    • Pros: Maximizes Black Friday revenue recovery; allows systematic thorough patching; minimizes holiday disruption.
    • Cons: Extended vulnerability window; continued limited attack participation; delayed breach notification may violate regulations.
    • Type Effectiveness: Moderately effective - maintains containment but delays complete remediation.
  • Option C: Third-Party Support & Parallel Platform - Engage external e-commerce security consultants, implement parallel backup shopping platform for critical retailers, conduct comprehensive forensic analysis of payment data exposure while maintaining operations.
    • Pros: Expert assistance accelerates response; business continuity for major retailers; thorough payment data assessment.
    • Cons: Expensive external support during holiday; potential payment data exposure to consultants; admission of insufficient internal capability.
    • Type Effectiveness: Moderately effective - improves response quality but extends timeline and increases cost.

Round Transition Narrative

After Round 1 → Round 2:

The team’s initial response determines whether the platform quickly returns to vulnerable operation (reboot approach) or maintains containment with significant retailer revenue impact (isolation/selective approaches). Either way, the situation escalates as major retailers threaten migration, payment processors report continued attacks, forensics reveals potential customer payment data exposure, and legal counsel demands regulatory compliance during the busiest shopping weekend of the year. The team must balance complete security remediation with retailer relationships, customer payment security, and Black Friday revenue recovery.


Full Game Materials (120-140 min, 3 rounds)

Investigation Sources Catalog

System Logs:

  • IIS Server Logs: Buffer overflow exploitation patterns in e-commerce platform servers, defacement timestamps showing rapid spreading during Black Friday morning peak traffic
  • Platform Network Logs: Massive scanning traffic from infected servers to internet IP ranges, coordinated attacks against payment processors and retail infrastructure
  • Transaction Logs: Black Friday sales disruption timeline, $50M in lost retailer revenue across 8-hour outage window
  • Key Discovery: Worm exploits IIS vulnerability that was identified but patching delayed to avoid Black Friday preparation disruption

Email/Communications:

  • Retailer Support Tickets: 1,500+ urgent escalations from retailers about defaced websites, lost Black Friday sales, and customer complaints
  • Platform Management Emails: Discussions about delaying IIS patches to avoid risking Black Friday platform stability - “40% of annual retailer revenue happens this weekend”
  • Retailer Communications: Major retailers (Target, Best Buy, Macy’s) threatening platform migration if revenue losses aren’t compensated
  • Key Discovery: Management prioritized Black Friday revenue over security patching, creating critical vulnerability window during highest-value period

Interviews (NPCs):

  • David Thompson (CEO): “We delayed patches to protect Black Friday for 5,000 retailers. How do I explain that the decision to prioritize revenue led to $50M in losses?”
  • Robert Chen (Security Director): “I flagged the vulnerability weeks ago, but nobody wanted to risk Black Friday. Now we’re attacking payment processors on the biggest shopping day of the year.”
  • Jennifer Martinez (Retailer Support): “I have major retailers threatening to leave our platform. Small retailers lost their entire holiday season. How do I tell them their businesses are at risk?”
  • Amanda Lee (Legal Counsel): “We have potential customer payment data exposure during Black Friday shopping rush. PCI-DSS requires immediate notification, but that could trigger mass credit card cancellations during holiday weekend.”
  • Key Insights: Tension between revenue priorities and security needs, small business impact of platform outages, payment industry interconnection complexity

System Analysis:

  • Platform Forensics: Code Red worm resident in IIS platform infrastructure, autonomous propagation through e-commerce server network
  • Vulnerability Assessment: 5,000 retailer websites running vulnerable IIS versions, patch deployment delayed by 3 weeks during holiday preparation
  • Payment Data Analysis: Potential exposure of customer credit card data, transaction logs, and retailer inventory systems during 12-hour worm residence
  • Key Discovery: Worm’s 12-hour dwell time during Black Friday means peak shopping customer payment data potentially accessible

Network Traffic:

  • Outbound Scanning: Infected platform servers systematically scanning internet for IIS vulnerabilities, attempting exploitation of payment processors and retail infrastructure
  • Attack Participation: Platform infrastructure participating in coordinated attacks against Visa/Mastercard payment gateways during Black Friday transaction peak
  • E-commerce Traffic Patterns: $50M revenue loss across 3,000 small retailers, major retailers ($100M+ annual revenue) successfully processed transactions after recovery
  • Key Discovery: Platform’s role in payment processing ecosystem means attacks threaten entire retail holiday shopping infrastructure

External Research:

  • Payment Industry Alerts: PCI Security Standards Council advisories about e-commerce platform vulnerabilities, payment processor security requirements
  • Retail Impact: Black Friday represents 30-40% of annual revenue for many retailers, platform outages threaten small business survival
  • Competitive Pressure: Competing e-commerce platforms (Shopify, BigCommerce) offering migration incentives to eShopHaven retailers
  • Key Insights: E-commerce platform outages have disproportionate impact on small business retailers who depend on holiday sales, payment data breach notification timing critical during shopping season

Response Evaluation Criteria

Type-Effective Approaches:

  • Worm Containment: Platform isolation stops propagation, memory clearing eliminates current infection, vulnerability patching prevents reinfection
  • Payment Data Protection: Immediate containment limits exposure, forensic analysis determines what was accessible, PCI-DSS compliance notification required
  • Super Effective: Combined platform patching + retailer restoration + transparent payment data assessment eliminates threat and maintains retailer/customer trust

Common Effective Strategies:

  • Immediate Platform Isolation: Disconnect vulnerable servers from internet to stop attack participation and worm spread
  • Emergency Patching: Deploy IIS security updates to entire platform infrastructure
  • Retailer Website Restoration: Restore shopping sites from pre-infection backups to recover Black Friday revenue capability
  • Payment Data Assessment: Forensic analysis of potential customer credit card exposure during worm residence
  • Transparent Retailer Communication: Proactive disclosure to retailers about revenue impact and platform security response demonstrates partnership

Common Pitfalls:

  • Reboot Without Patching: Temporary Black Friday revenue recovery but immediate reinfection continues attack participation
  • Revenue-Prioritized Selective Restoration: Helps major retailers but damages small retailer trust through differential treatment
  • Delayed Payment Data Notification: Waiting to understand full scope violates PCI-DSS timelines and threatens customer payment security
  • Insufficient Retailer Compensation: Failing to address revenue losses for small retailers who depend on Black Friday damages platform relationships
  • Ignoring Payment Processor Impact: Focusing only on retailer websites while platform attacks payment gateways threatens entire e-commerce ecosystem

Adjudicating Novel Approaches:

Hybrid Solutions (Encourage with Guidance):

  • “We’ll implement emergency read-only shopping catalog while patching platform infrastructure” → “Yes, and… that maintains shopping visibility. How do you enable transaction processing? Can you route to backup payment systems?”
  • “We’ll coordinate with payment processors on simultaneous security response” → “Yes, and… excellent ecosystem thinking. What coordination mechanisms do Visa/Mastercard security teams need? How do you share threat intelligence?”
  • “We’ll restore from backups while offering retailers revenue-loss compensation tied to contract extensions” → “Yes, and… smart business continuity approach. How do you calculate fair compensation? What contract terms retain retailers while being financially sustainable?”

Creative But Problematic (Redirect Thoughtfully):

  • “We’ll keep platform offline until after Black Friday weekend to do thorough patching” → “That ensures complete security, but Jennifer reports 5,000 retailers lose their entire holiday revenue. How do small businesses survive? What’s the platform’s long-term viability?”
  • “We’ll notify only affected retailers about payment data exposure, not customers” → “That simplifies communication, but PCI-DSS requires customer notification. How do you balance retailer relationships with regulatory compliance and customer payment security?”
  • “We’ll prioritize major retailers and let small retailers handle their own recovery” → “That protects high-value relationships, but 3,000 small businesses depend on your platform. What happens to platform reputation as small business partner?”

Risk Assessment Framework:

  • Low Risk Solutions: Full platform patching + comprehensive retailer restoration + transparent payment data notification → Encourage and approve
  • Medium Risk Solutions: Phased remediation + prioritized retailer communication + enhanced payment monitoring → Approve with PCI-DSS compliance verification
  • High Risk Solutions: Quick fixes + delayed notification + revenue-prioritized selective treatment → Challenge with regulatory violation and trust damage consequences

Advanced Challenge Materials (150-170 min, 3 rounds)

Investigation Sources WITH Complexity

Base Evidence Sources: [Same as Full Game catalog above]

Subtle Evidence Layer:

  • Payment Data Exposure Ambiguity: Evidence of worm accessing platform infrastructure could be random propagation OR deliberate targeting of payment systems - requires deep forensics to distinguish automated worm behavior from potential attacker exploitation
  • Retailer Revenue Impact Assessment: Determining actual lost revenue requires understanding each retailer’s historical Black Friday performance, product margins, customer demographics - not immediately clear from transaction logs alone
  • Patch Delay Decision Timeline: Multiple email threads discuss IIS patching at various stages of Black Friday preparation - requires careful analysis to determine when specific risks were known and what management decisions occurred
  • Small Business Survival Impact: Understanding which retailers face existential threat from Black Friday revenue loss requires knowledge of their business models, debt obligations, seasonal revenue dependency - not visible in platform data alone

Red Herrings:

  • Planned Black Friday Load Scaling: Platform automatically scales infrastructure during Black Friday traffic surges - some server restarts and reconfigurations are legitimate load management, not worm activity
  • Retailer Custom Integration Issues: Several major retailers implemented custom checkout integrations that break during platform updates - distinguishing legitimate integration failures from worm defacement requires retailer-by-retailer analysis
  • Previous Black Friday Outage: Last year, different issue caused 4-hour platform disruption - creates confusion about whether current incident involves same root causes or new vulnerability
  • Competitive DDoS Speculation: Some retailers initially speculate competitors attacked platform to gain Black Friday market share - misdirection from actual worm propagation

Expert-Level Insights:

  • Payment Industry Interconnection: Recognizing that e-commerce platform attacking payment processor gateways threatens entire retail payment infrastructure - Visa/Mastercard disruption has cascading impact beyond eShopHaven
  • Small Business Holiday Dependency: Understanding that 40% annual revenue concentration in Black Friday weekend means platform outage has existential impact on small retailer survival - not just inconvenience but business failure risk
  • Seasonal Security Trade-Off Pattern: Recognizing that retail industry systematically prioritizes operational stability over security patching during Q4 holiday season - reveals industry-wide vulnerability window
  • PCI-DSS Notification Timing Dilemma: Understanding that Black Friday weekend breach notification triggers mass customer credit card cancellations that compound retailer revenue losses - regulatory compliance timing has major business consequences

Response Evaluation with Innovation Requirements

Standard Approaches (Baseline):

  • Isolate platform to stop propagation
  • Deploy emergency IIS patches
  • Restore retailer websites from backups
  • Assess customer payment data exposure
  • Notify affected parties per PCI-DSS requirements

Why Standard Approaches Are Insufficient:

  • Holiday Revenue Concentration: Standard “shut everything down” approach destroys Black Friday revenue for 5,000 retailers who depend on this weekend for annual survival - requires creative revenue recovery
  • Small Business Existential Impact: Standard incident response doesn’t account for retailers facing business failure from lost holiday revenue - requires innovative compensation or business continuity solutions
  • Payment Industry Interconnection: Standard containment doesn’t address platform’s attacks on payment processors threatening broader retail payment infrastructure - requires ecosystem coordination
  • PCI-DSS Notification Timing: Standard breach notification during Black Friday weekend triggers mass credit card cancellations compounding retailer losses - requires innovative compliance approach balancing regulation with business impact
  • Competitive Platform Pressure: Standard response doesn’t address competitors offering migration incentives during vulnerability - requires innovative retailer retention beyond just technical remediation

Innovation Required:

Emergency Shopping Continuity Architecture:

  • Creative Approach Needed: Develop rapid parallel read-only shopping catalog with external payment routing, enabling browsing and transaction processing while remediating main platform - requires fast deployment of backup commerce infrastructure
  • Evaluation Criteria: Can parallel shopping system be deployed within Black Friday timeline? Does external payment routing maintain PCI compliance? What transaction processing limitations exist?

Tiered Retailer Support Strategy:

  • Creative Approach Needed: Differentiate compensation and support based on retailer business impact - small businesses facing survival risk get emergency revenue support, major retailers get contract extensions, custom integration retailers get technical assistance
  • Evaluation Criteria: Is tiering approach fair given differential impact? Are compensation tiers economically sustainable for platform? Does strategy retain both small and enterprise retailers?

Payment Processor Ecosystem Coordination:

  • Creative Approach Needed: Coordinate with Visa/Mastercard security teams on simultaneous threat response, share attack traffic intelligence, potentially implement distributed payment routing to reduce attack impact - requires payment industry collaboration
  • Evaluation Criteria: What threat intelligence sharing is appropriate with payment processors? Can distributed routing reduce gateway attack impact? How does coordination affect PCI-DSS compliance posture?

Holiday-Sensitive Breach Notification:

  • Creative Approach Needed: Develop customer notification approach that meets PCI-DSS requirements while minimizing Black Friday credit card cancellation impact - potentially phased notification with immediate protective measures (fraud monitoring) before full disclosure
  • Evaluation Criteria: Does approach comply with 72-hour notification requirements? Are protective measures sufficient to meet regulatory intent? What’s the customer communication strategy balancing security and shopping continuity?

Network Security Status Tracking

Initial State (100%):

  • 5,000 retailer websites on shared IIS platform infrastructure
  • Black Friday morning: peak shopping traffic, 40% annual revenue concentration
  • IIS vulnerability known but patching delayed for holiday season stability

Degradation Triggers:

  • Hour 0-4: Initial worm infection spreads autonomously through platform during Black Friday morning (-25% per hour unchecked during peak traffic)
  • Hour 4-8: Retailer websites defaced, shopping transactions disrupted (-15% per hour retailer revenue loss)
  • Hour 8-12: Platform attacks payment processors, threatening broader retail payment infrastructure (-20% per hour payment industry trust)
  • Hour 12-24: Major retailers threaten migration, small retailers face survival risk (-15% per hour platform viability)
  • Hour 24+: Black Friday weekend continues with partial recovery or extended vulnerability, competitive pressure intensifies (-10% per hour market position)

Recovery Mechanisms:

  • Platform Isolation: Stops propagation and attack participation (+40% containment, -50% retailer revenue during isolation)
  • Emergency IIS Patching: Prevents reinfection (+50% security, -20% service availability during deployment)
  • Retailer Website Restoration: Returns shopping capability (+40% revenue recovery, requires secure baseline)
  • Payment Processor Coordination: Reduces ecosystem attack impact (+20% payment industry trust, requires collaboration)
  • Retailer Compensation Program: Mitigates business impact and maintains relationships (+30% retailer retention, high cost)

Critical Thresholds:

  • Below 60% Security: Worm continues spreading, payment data exposure escalates, reinfection cycle established
  • Below 50% Retailer Revenue: Small businesses face survival risk, Black Friday losses threaten annual viability
  • Below 40% Payment Industry Trust: Payment processors restrict platform connectivity, threatening long-term transaction capability
  • Below 30% Retailer Retention: Major retailers migrate to competitors, platform market position damaged

Consequences:

  • Excellent Response (>80% across metrics): Black Friday revenue largely recovered, vulnerability eliminated, retailer relationships maintained, platform becomes retail security case study
  • Good Response (60-80%): Majority of retailers recover partial Black Friday revenue, vulnerability addressed, payment data exposure contained, platform survives with reputation damage
  • Adequate Response (40-60%): Significant retailer revenue loss but most businesses survive, security improved but trust damaged, small retailer attrition begins
  • Poor Response (<40%): Widespread small retailer business failures, major retailers migrate to competitors, payment processor restrictions, platform market position critically damaged